US20120144503A1 - Method and device for identifying objects or documents - Google Patents
Method and device for identifying objects or documents Download PDFInfo
- Publication number
- US20120144503A1 US20120144503A1 US12/598,077 US59807708A US2012144503A1 US 20120144503 A1 US20120144503 A1 US 20120144503A1 US 59807708 A US59807708 A US 59807708A US 2012144503 A1 US2012144503 A1 US 2012144503A1
- Authority
- US
- United States
- Prior art keywords
- document
- mark
- identification mark
- copy
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/003—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
Definitions
- This invention concerns a process and a device for identifying objects or documents. It applies in particular to the traceability of objects and the fight against counterfeiting.
- identification processes that consist of applying an identification code to each object to be identified, for example in the form of a bar code.
- this code is easy to recopy and enables counterfeiting by slavish reproduction, whatever the complexity of the code used for representing the original information.
- the aim of the present invention is to remedy these drawbacks.
- the present invention envisages, according to a first aspect, a process for identifying documents, that comprises:
- each product has a unique identification.
- the identification mark's line of dependence with the anti-copy mark can be verified.
- any copy of this document is detectable in two ways: for slavish copies, as a result of the anti-copy mark's deterioration and, for copies by reproduction, as a result of the disappearance of the line of dependence between the anti-copy mark and the identification mark.
- the process comprises a step of printing a uniform area and the step of marking the document to form the identification mark comprises a step of emitting light with a laser in the uniform area.
- the marking of the identification mark is rapid and precise, and does not require the use of a printer on the production line.
- the step of marking the document comprises a step of detecting the uniform area's arrival in front of said laser.
- the marking of the identification mark can be realized on a machine independent of the print chain with which the anti-copy mark and the uniform area are realized.
- a random or pseudo-random number is utilized during the step of generating the identification mark.
- the process that is the subject of the present invention comprises, in addition, a step of invisibly marking the identification mark on said document.
- the process that is the subject of the present invention comprises, in addition, a step of reading the identification mark and a step of verifying the quality of the identification mark read.
- the identification mark is of a textual type, i.e. readable by human beings. Inputting and interpreting the identification mark are thus facilitated.
- the identification mark also has an anti-copy property.
- the document's security is thus strengthened.
- a document identification device that comprises:
- This invention envisages, according to a third aspect, a process for verifying the identification of documents, that comprises:
- This invention envisages, according to a fourth aspect, a device for verifying the identification of documents, that comprises:
- this identification verification process As the particular characteristics, advantages and aims of this identification device, this identification verification process and this identification verification device are similar to those of the identification process that is the subject of this invention, as described in brief above, they are not repeated here.
- FIG. 1 represents, schematically and in a side view, a particular embodiment of the device that is the subject of this invention
- FIG. 2 represents, in the form of a flowchart, steps in a particular embodiment of the identification process that is the subject of this invention.
- FIG. 3 represents, in the form of a flowchart, steps in a particular embodiment of the identification verification process that is the subject of this invention.
- FIG. 4 represents, schematically, an example of a document realized by the utilization of the process or device that are subjects of this invention.
- Each step in creating the information matrix is carried out with the aim of the original message being readable without error, even if, and this is a wished-for effect, the initial reading of the information matrix is marred by errors.
- one of the aims of this information matrix creation is to use the number or rate of errors of encoded, replicated, swapped or scrambled messages in order to determine the authenticity of a mark of the information matrix and therefore of the document that bears it.
- the rate of this degradation can be adjusted according to print characteristics, such that the production of a copy gives rise to additional errors, resulting in an error rate that is, on average, higher when a copy is read than when an original is read.
- an analogy with communications systems can be useful.
- the passage of the encoded, scrambled message to the information matrix that represents it is none other than a modulation of the message, this modulation being defined as the process by which the message is transformed from its original form into a form suitable for transmission over a channel.
- This communications channel namely the information transmission medium that links the source to the recipient and allows the message to be transported, differs depending on whether the captured information matrix is a captured original information matrix or a captured copied information matrix.
- the communications channel can vary: thus the “communications channel of an original” and the “communications channel of a copy” are differentiated. This difference can be measured in terms of the signal/noise ratio, this ratio being lower for a captured copied information matrix.
- the coded message extracted from a captured copied information matrix will have more errors than the coded message extracted from a captured original information matrix.
- the number or rate of errors detected is, in accordance with this invention, used to distinguish a copy from an original.
- FIG. 1 shows an embodiment of the identification device 100 that is the subject of this invention adapted to a machine processing documents that may have been printed at other sites or on other dates.
- this device 100 that is the subject of this invention is adapted to a print chain and processes the documents from their initial printing.
- the document identification device 100 comprises:
- FIG. 1 also shows a device 170 for verifying the identification of documents 110 , that comprises:
- the unstacker 105 is upstream of the print chain and it is only after printing that the documents 110 bear, firstly, an anti-copy mark 115 , and, secondly, a printed area 120 .
- a laser marking area is prepared on the document 110 by printing a tint area 120 , for example a black square with dimensions of 3.2 or 5 mm, close to the anti-copy mark 115 .
- This addition is, for example, carried out during the analog print process, for example offset, of the document 110 .
- This print process is carried out at great speed by always reproducing the same image, including the anti-copy mark 115 and the uniform tint area 120 , on each document 110 .
- the documents 110 are next cut one at a time and then transported to the unstacker 105 .
- the means 125 for reading the anti-copy mark 115 comprises a camera 126 and at least one light source 127 , as well as a means for detecting 128 the arrival of a document 110 , for example an opto-electronic cell placed on the path followed by the documents, upstream from the reading means 125 .
- a means for detecting 128 the arrival of a document 110 for example an opto-electronic cell placed on the path followed by the documents, upstream from the reading means 125 .
- two light-sensitive cells are utilized, one for detecting the arrival of the document 110 and the other, synchronized by the first, for detecting the arrival of a tint area 120 .
- the reading means 125 also comprises a means for processing 129 the image captured by the camera 126 , which determines characteristics of the image of the anti-copy mark 115 .
- a vision system dynamically reads the value of the anti-copy mark 115 and then transmits the information to the means for generating 130 the identification mark 135 .
- the vision system dynamically calculates the position according to two orthogonal axes and the angular orientation of the area 120 , with respect to the axis of the conveyor 106 , and supplies these coordinates to the marking means 140 .
- the means 130 generates an identification mark 135 , which can vary from one document to another, and according to the reading of the anti-copy mark 115 .
- the generation means 130 utilizes a random or pseudo-random number for generating the identification mark 135 .
- each identification mark 135 is dependent on the print of the anti-copy mark 115 .
- the means 130 After reading at least one sub-set of the information of the anti-copy mark 115 (If the reading fails, the document's withdrawal is triggered, as described below), the means 130 generates an identification mark 135 from the sub-set of the information of the anti-copy mark 115 read and, optionally, from a unique code, a time-stamp and/or one or more encryption keys, jointly or separately called “associated value” in the rest of the description.
- the associated value, inserted in the identification mark 135 is specific to each identification mark generated.
- the sequence of steps during the generation and marking of the identification mark 135 associated to the anti-copy mark 115 is, in particular embodiments, as follows:
- CENC ENCRYPT( C,KCV )
- the “F” function can be a hash function, for example of the type known by the name “SHA-1”, “SHA-256” or “MD5”.
- the “F” function therefore calculates the hash of the value carried by the anti-copy mark 115 , and if data volume constraints apply, keeps a sub-set of the result, for example the first four bytes.
- F′ in the case where the “F′” function is used with parameter(s) “K”, “F′” can, for example, be an encryption function (for example, known by the name “Triple-DES” or “ ”AES”). “F′” can also be a hash function such as those mentioned previously, in combination with a key, here the parameter “K”, which must be kept secret.
- the values “VA”, “T”, “ID”, “IDA” can be integers or have a value belonging to a defined set (for example, there are four machines generating identification marks 135 , thus there are four possible values for “ID”).
- the number of bits required to represent the set of possible values is defined.
- the integers are generally represented over a defined set of bits.
- ENCRYPT can be a symmetric encryption function, for example known by the name “Triple DES”, “AES” or “RC4”, or an asymmetric encryption function, for example known by the name “RSA”.
- this is generally a function generating a two-dimensional bar code, the one-dimensional bar codes having a limited information capacity.
- Datamatrix registered trademark
- the “MODCV” function can also be a function generating a secured information matrix, which requires one or more encryption and scrambling keys. It is noted that, in this case, the “ENCRYPT” function is not necessary, encryption being intrinsic to the generation of the identification mark 135 .
- the “MODCV” function is a function generating an uncoded marking, such as a text.
- this information matrix is, in part, naturally degraded during printing such that it has authentication properties.
- the means 140 for marking each document 110 to form the identification mark 135 that corresponds individually to this document 110 comprises, in an embodiment, a laser source 141 and at least one galvanometer mirror 142 .
- the laser source produces a femtosecond laser beam, allowing quicker marking thanks to radiation that is more powerful and that has a higher modulation frequency.
- the laser source 141 is associated to an array optical modulator, or optical valve, for example to a liquid crystal matrix display. It is noted that the laser makes a local abrasion of the ink of the printed tint area 120 .
- the device 100 comprises, in addition, a means for marking 145 a second identification mark 146 on the document 100 , in a position other than the position where the anti-copy mark and identification mark 135 are located, for example on the reverse side of the document 100 .
- a means for marking 145 a second identification mark 146 on the document 100 in a position other than the position where the anti-copy mark and identification mark 135 are located, for example on the reverse side of the document 100 .
- a means for marking 145 a second identification mark 146 on the document 100 in a position other than the position where the anti-copy mark and identification mark 135 are located, for example on the reverse side of the document 100 .
- a low-power laser with or without pre-printing a uniform area, or an ink that is invisible in the visible field and visible in the infrared field.
- the second identification mark 146 is, potentially, identical to the first identification mark 135 .
- the means 180 for reading the identification mark 135 which comprises a camera and at least one light source (not shown), is associated to a means 155 for verifying the quality of the identification mark read and a means (not shown) for withdrawing each document 100 bearing a poor quality identification mark 135 .
- the quality of each document is verified and all distributed documents benefit from the protection provided by utilizing this invention.
- the result of the verification carried out by the verification means 180 is transmitted, to be stored and used later, to a supervisor (not shown).
- the means for withdrawing each document 100 bearing a poor quality identification mark 135 is, for example, constituted of a “reject gate”, i.e. a shutter controlled so that, in one of its positions, the documents fall into a waste bin and, in another position, the documents are let through to the stacker 107 .
- a “reject gate” i.e. a shutter controlled so that, in one of its positions, the documents fall into a waste bin and, in another position, the documents are let through to the stacker 107 .
- the means 125 for reading the anti-copy mark 115 formed on a document 115 comprises a camera and at least one light source and is associated to a means for processing 178 the image captured by this camera, which determines characteristics of the image of the anti-copy mark 115 , according to techniques known per se in the field of anti-copy markings.
- the means 185 for determining whether the anti-copy mark 115 and the identification mark 135 present a pre-determined relationship carries out the verification of a document's validity:
- FIG. 2 shows that the identification process for a document that is the subject of this invention comprises, firstly, a step 205 of marking the document with an anti-copy mark that is identical for a plurality of documents.
- a step of printing a uniform area is carried out.
- the anti-copy mark is read. During this step the quality of the anti-copy mark is verified.
- an identification mark is generated that can vary from one document to another and according to the reading of the anti-copy mark. For example, a random or pseudo-random number is utilized during the step 220 of generating the identification mark.
- Step 225 the document is marked in order to form the identification mark on said document.
- Step 225 comprises:
- the identification mark is invisibly marked on the document.
- the identification mark is read and, during a step 250 , the quality of the identification mark read is verified.
- the document is kept in the production flow or it is withdrawn from the production flow, so that all the identification marks of the documents remaining in the flow are of a sufficiently high quality.
- each document or product has an identification that can be read easily.
- the identification mark's line of dependence with the anti-copy mark can be verified.
- any copy of this document is detectable in two ways: firstly, as a result of the anti-copy mark's deterioration and, secondly, as a result of the disappearance of the line of dependence between the anti-copy mark and the identification mark.
- the marking of the identification mark is rapid and precise, and does not require the use of a printer on the production line. It can be realized on a machine independent of the print chain with which the anti-copy mark and the uniform area are realized.
- FIG. 3 shows that the process verifying a document's identification comprises:
Abstract
The document identification method comprises: a step of marking the document with an anti-copy mark that is identical for a plurality of documents; a step of reading an anti-copy mark; a step of generating an identification mark that can vary from one document to another and according to the reading of the anti-copy mark and; a step of marking said document to form said identification mark on said document. In embodiments the method comprises, in addition, a step of printing a uniform area and the step of marking the document to form the identification mark comprises a step of emitting light with a laser in the uniform area. In embodiments the method comprises, in addition, a step of invisibly marking the identification mark on said document.
Description
- This invention concerns a process and a device for identifying objects or documents. It applies in particular to the traceability of objects and the fight against counterfeiting.
- There are identification processes that consist of applying an identification code to each object to be identified, for example in the form of a bar code. However, this code is easy to recopy and enables counterfeiting by slavish reproduction, whatever the complexity of the code used for representing the original information.
- There are also anti-copy marking processes through which a mark is formed, for example by printing a “digital watermark” (in French a “filigrane numérique”) concealed in an image or a matrix of contrasted dots printed in a very small size, a mark that, if it is copied, presents a degradation that can be detected. However, for static means of marking (in which the image or dot matrix cannot vary with each print), these marks do not allow each object to be identified individually.
- The aim of the present invention is to remedy these drawbacks.
- To this end, the present invention envisages, according to a first aspect, a process for identifying documents, that comprises:
- a step of marking the document with an anti-copy mark that is identical for a plurality of documents,
- a step of reading an anti-copy mark,
- a step of generating an identification mark that can vary from one document to another and according to the reading of the anti-copy mark and
- a step of marking said document to form said identification mark on said document.
- Thanks to these provisions, each product has a unique identification. In addition, the identification mark's line of dependence with the anti-copy mark can be verified. Conversely, any copy of this document is detectable in two ways: for slavish copies, as a result of the anti-copy mark's deterioration and, for copies by reproduction, as a result of the disappearance of the line of dependence between the anti-copy mark and the identification mark.
- According to particular features, the process, as described in brief above, comprises a step of printing a uniform area and the step of marking the document to form the identification mark comprises a step of emitting light with a laser in the uniform area.
- Thanks to these provisions, the marking of the identification mark is rapid and precise, and does not require the use of a printer on the production line.
- According to particular features, the step of marking the document comprises a step of detecting the uniform area's arrival in front of said laser.
- Thanks to these provisions, the marking of the identification mark can be realized on a machine independent of the print chain with which the anti-copy mark and the uniform area are realized.
- According to particular features, a random or pseudo-random number is utilized during the step of generating the identification mark.
- According to particular features, the process that is the subject of the present invention, as described in brief above, comprises, in addition, a step of invisibly marking the identification mark on said document.
- According to particular features, the process that is the subject of the present invention, as described in brief above, comprises, in addition, a step of reading the identification mark and a step of verifying the quality of the identification mark read.
- Thanks to these provisions, the quality of each document is verified and all distributed documents benefit from the protection provided by utilizing this invention.
- According to particular features, the identification mark is of a textual type, i.e. readable by human beings. Inputting and interpreting the identification mark are thus facilitated.
- According to particular features, the identification mark also has an anti-copy property. The document's security is thus strengthened.
- This invention envisages, according to a second aspect, a document identification device, that comprises:
- a means for reading an anti-copy mark formed on a document,
- a means for generating an identification mark that can vary from one document to another and according to the reading of the anti-copy mark and
- a means for marking said document to form said identification mark on said document.
- This invention envisages, according to a third aspect, a process for verifying the identification of documents, that comprises:
- a step of reading an anti-copy mark formed on a document,
- a step of reading, on said document, an identification mark that can vary from one document to another and
- a step of determining whether the anti-copy mark and the identification mark present a pre-determined relationship.
- This invention envisages, according to a fourth aspect, a device for verifying the identification of documents, that comprises:
- a means for reading an anti-copy mark formed on a document,
- a means for reading, on said document, an identification mark that can vary from one document to another and
- a means for determining whether the anti-copy mark and the identification mark present a pre-determined relationship.
- As the particular characteristics, advantages and aims of this identification device, this identification verification process and this identification verification device are similar to those of the identification process that is the subject of this invention, as described in brief above, they are not repeated here.
- Other advantages, aims and characteristics of the present invention will become apparent from the description that follows, made, as an example that is in no way limiting, with reference to the drawings included in an appendix, in which:
-
FIG. 1 represents, schematically and in a side view, a particular embodiment of the device that is the subject of this invention, -
FIG. 2 represents, in the form of a flowchart, steps in a particular embodiment of the identification process that is the subject of this invention. -
FIG. 3 represents, in the form of a flowchart, steps in a particular embodiment of the identification verification process that is the subject of this invention and -
FIG. 4 represents, schematically, an example of a document realized by the utilization of the process or device that are subjects of this invention. - Before giving the details of the various particular embodiments of this invention, the definitions that will be used in the description are given below.
-
- “information matrix”: this is a machine-readable physical representation of a message, generally affixed on a solid surface (unlike watermarks or digital watermarks, which modify the values of the pixels of a design to be printed). The information matrix definition encompasses, for example, 2D bar codes, one-dimensional bar codes and other less intrusive means for representing information, such as “Dataglyphs” (data marking);
- “cell”: this is an element of the information matrix that represents a unit of information;
- “document”: this is any (physical) object whatsoever bearing an information matrix;
- “marking” or “printing”: any process by which a digital image (including an information matrix, a document, etc) is represented in the real world, this representation generally being made on a surface: this includes, in a non-exclusive way, ink-jet, laser, offset and thermal printing, and also embossing, laser engraving and hologram generation. More complex processes are also included, such as molding, in which the information matrix is first engraved in the mold, then molded on each object (note that a “molded” information matrix can be considered to have three dimensions in the physical world even if its digital representation only comprises two dimensions). It is also noted that several of the processes mentioned include several processing actions, for example standard offset printing (unlike “computer-to-plate” offset), including the creation of a film, said film being used to create a plate, said plate being used in the printing. Other processes also allow an item of information to be printed in the non-visible domain, either by using frequencies outside the visible spectrum, or by inscribing the information inside the surface, etc, and
- “capture”: any process by which a digital representation of the real world is obtained, including the digital representation of a physical document containing an information matrix.
- By way of introduction to the description of particular embodiments of the process and device that are subjects of the present invention, it is noted that the result of the degradation of an information matrix is that certain cells cannot be correctly decoded.
- Each step in creating the information matrix is carried out with the aim of the original message being readable without error, even if, and this is a wished-for effect, the initial reading of the information matrix is marred by errors. In particular, one of the aims of this information matrix creation is to use the number or rate of errors of encoded, replicated, swapped or scrambled messages in order to determine the authenticity of a mark of the information matrix and therefore of the document that bears it.
- In effect, the rate of this degradation can be adjusted according to print characteristics, such that the production of a copy gives rise to additional errors, resulting in an error rate that is, on average, higher when a copy is read than when an original is read.
- In order to understand why measuring the message's error rate can be sufficient to determine whether a document is an original or a copy, an analogy with communications systems can be useful. In effect, the passage of the encoded, scrambled message to the information matrix that represents it is none other than a modulation of the message, this modulation being defined as the process by which the message is transformed from its original form into a form suitable for transmission over a channel. This communications channel, namely the information transmission medium that links the source to the recipient and allows the message to be transported, differs depending on whether the captured information matrix is a captured original information matrix or a captured copied information matrix. The communications channel can vary: thus the “communications channel of an original” and the “communications channel of a copy” are differentiated. This difference can be measured in terms of the signal/noise ratio, this ratio being lower for a captured copied information matrix.
- The coded message extracted from a captured copied information matrix will have more errors than the coded message extracted from a captured original information matrix. The number or rate of errors detected is, in accordance with this invention, used to distinguish a copy from an original.
-
FIG. 1 shows an embodiment of theidentification device 100 that is the subject of this invention adapted to a machine processing documents that may have been printed at other sites or on other dates. In other embodiments, thisdevice 100 that is the subject of this invention is adapted to a print chain and processes the documents from their initial printing. - The
document identification device 100 comprises: -
- an
unstacker 105, known per se, which unstacks documents 110 (seeFIG. 4 ) bearing, firstly, ananti-copy mark 115, generally identical on all thedocuments 110, and, secondly, a printedarea 120, generally of a uniform color, for example black, - a
conveyor 106, of known type, - a
stacker 107, which makes a stack of thedocuments 110 processed by thedevice 100, - a
means 125 for reading theanti-copy mark 115 formed on eachdocument 110, - a
means 130 for generating anidentification mark 135, which can vary from one document to another and according to the reading of theanti-copy mark 115 and - a
means 140 for marking eachdocument 110 to form saididentification mark 135 corresponding, individually, to saiddocument 110.
- an
-
FIG. 1 also shows adevice 170 for verifying the identification ofdocuments 110, that comprises: -
- a
means 175 for reading theanti-copy mark 115 formed on eachdocument 110, - a
means 180 for reading anidentification mark 135 and - a
means 185 for determining whether theanti-copy mark 115 and theidentification mark 135 present a pre-determined relationship.
- a
- In the case in which this invention is adapted to a print chain, the
unstacker 105 is upstream of the print chain and it is only after printing that thedocuments 110 bear, firstly, ananti-copy mark 115, and, secondly, a printedarea 120. - In each of these two case mentioned above, a laser marking area is prepared on the
document 110 by printing atint area 120, for example a black square with dimensions of 3.2 or 5 mm, close to theanti-copy mark 115. This addition is, for example, carried out during the analog print process, for example offset, of thedocument 110. This print process is carried out at great speed by always reproducing the same image, including theanti-copy mark 115 and theuniform tint area 120, on eachdocument 110. In the case in which the documents are destined to form folders, thedocuments 110 are next cut one at a time and then transported to theunstacker 105. - The means 125 for reading the
anti-copy mark 115 comprises acamera 126 and at least onelight source 127, as well as a means for detecting 128 the arrival of adocument 110, for example an opto-electronic cell placed on the path followed by the documents, upstream from the reading means 125. In embodiments two light-sensitive cells are utilized, one for detecting the arrival of thedocument 110 and the other, synchronized by the first, for detecting the arrival of atint area 120. - The reading means 125 also comprises a means for processing 129 the image captured by the
camera 126, which determines characteristics of the image of theanti-copy mark 115. Thus, in order to match the hidden value of theanti-copy mark 115 and anidentification mark 135 that is going to be generated individually for eachdocument 110, a vision system dynamically reads the value of theanti-copy mark 115 and then transmits the information to the means for generating 130 theidentification mark 135. - In order to ensure the precise positioning of the identification mark in the
pre-printed marking area 120, the vision system dynamically calculates the position according to two orthogonal axes and the angular orientation of thearea 120, with respect to the axis of theconveyor 106, and supplies these coordinates to the marking means 140. - The means 130 generates an
identification mark 135, which can vary from one document to another, and according to the reading of theanti-copy mark 115. In embodiments, the generation means 130 utilizes a random or pseudo-random number for generating theidentification mark 135. - As described above, an individual value is inserted into each
identification mark 135 and is dependent on the print of theanti-copy mark 115. After reading at least one sub-set of the information of the anti-copy mark 115 (If the reading fails, the document's withdrawal is triggered, as described below), themeans 130 generates anidentification mark 135 from the sub-set of the information of theanti-copy mark 115 read and, optionally, from a unique code, a time-stamp and/or one or more encryption keys, jointly or separately called “associated value” in the rest of the description. - The associated value, inserted in the
identification mark 135, is specific to each identification mark generated. The sequence of steps during the generation and marking of theidentification mark 135 associated to theanti-copy mark 115 is, in particular embodiments, as follows: -
- capturing an image of a document's
anti-copy mark 115, - reading at least one sub-set of the information of the
anti-copy mark 115, - if the reading fails, the production is stopped since an identification mark associated to the anti-copy mark cannot be generated,
- generating the
identification mark 135 from the sub-set of the information of theanti-copy mark 115 read and optional information (unique code, time-stamp and/or one or more encryption key(s)) and - printing the
identification mark 135 on the document bearing the correspondinganti-copy mark 115.
- capturing an image of a document's
- An example of the method for generating the
identification mark 135 is given below. -
- from sub-set “ICNA” of the information of the
anti-copy mark 115, the associated value “VA” is calculated by an associated value calculation function “F”, or a function “F′” that optionally uses one or more other parameters designated as “K”, - a timestamp “T” is obtained,
- an identifier “ID” of the machine generating identification marks is obtained,
- a code “IDA”, for example of a machine generating random codes, is obtained (In a variant, a serialized code is obtained),
- an encryption key “KCV” of the identification mark is obtained,
- “VA”, “T”, “ID” and “IDA” are concatenated, preferably in a binary representation, with a “CONC” function in order to obtain the concatenation “C”,
- the concatenation “C” is encoded with an “ENCRYPT” encryption function and the encryption key KCV, in order to obtain “CENC”,
- the
identification mark 135 is constructed, from the encoded concatenation “CENC”, by using a “MODCV” variable code modulation function.
- from sub-set “ICNA” of the information of the
- Schematically, the steps can be expressed as:
-
VA=F(ICNA) or VA=F′(ICNA,K) -
C=CONC(VA,ID,T,IDA) -
CENC=ENCRYPT(C,KCV) -
CV=MOD CV(CENC) - We now describe the possible choices and the variants for the functions “F”, “F′”, “CONC”, “ENCRYPT” and “MODCV”.
- With regard to the “F” function, this is, in a non-limiting way, a function that calculates a value “VA” from a value “ICNA” carried by the
anti-copy mark 115 or a sub-set of this value. For example, if the value carried by theanti-copy mark 115 has a size of eight bytes, where the last four bytes are not very useful because they contain generic data, and the first four bytes contain an identifier of the anti-copy mark, then these four bytes can simply be assigned to the value “VA”. In this case, “VA=ICNA>>32” (>>indicates a bitshift), where “F” is the function “>>32”. Alternatively, the “F” function can be a hash function, for example of the type known by the name “SHA-1”, “SHA-256” or “MD5”. The “F” function therefore calculates the hash of the value carried by theanti-copy mark 115, and if data volume constraints apply, keeps a sub-set of the result, for example the first four bytes. - With regard to the “F′” function, in the case where the “F′” function is used with parameter(s) “K”, “F′” can, for example, be an encryption function (for example, known by the name “Triple-DES” or “ ”AES”). “F′” can also be a hash function such as those mentioned previously, in combination with a key, here the parameter “K”, which must be kept secret.
- In a variant, if an anti-copy mark characterization method is applied to obtain a fingerprint “E”, “F” and “F′” are functions of “E” such that VA=F(E, ICNA) and VA=F′(E, ICNA,K).”
- With regard to the “CONC” function, the values “VA”, “T”, “ID”, “IDA” can be integers or have a value belonging to a defined set (for example, there are four machines generating identification marks 135, thus there are four possible values for “ID”). In the second case, the number of bits required to represent the set of possible values is defined. In the first, the integers are generally represented over a defined set of bits.
- With regard to the “ENCRYPT” function, it can be a symmetric encryption function, for example known by the name “Triple DES”, “AES” or “RC4”, or an asymmetric encryption function, for example known by the name “RSA”.
- With regard to the “MODCV” function, this is generally a function generating a two-dimensional bar code, the one-dimensional bar codes having a limited information capacity. It is noted that “Datamatrix” (registered trademark) are high information capacity 2D bar codes, widely used and which, as a result, can be utilized for generating the
identification mark 135. The “MODCV” function can also be a function generating a secured information matrix, which requires one or more encryption and scrambling keys. It is noted that, in this case, the “ENCRYPT” function is not necessary, encryption being intrinsic to the generation of theidentification mark 135. - In variants, the “MODCV” function is a function generating an uncoded marking, such as a text.
- In variants where the “MODCV” function is a function generating a secured information matrix, this information matrix is, in part, naturally degraded during printing such that it has authentication properties.
- The means 140 for marking each
document 110 to form theidentification mark 135 that corresponds individually to thisdocument 110 comprises, in an embodiment, alaser source 141 and at least onegalvanometer mirror 142. For preference, the laser source produces a femtosecond laser beam, allowing quicker marking thanks to radiation that is more powerful and that has a higher modulation frequency. In a variant, thelaser source 141 is associated to an array optical modulator, or optical valve, for example to a liquid crystal matrix display. It is noted that the laser makes a local abrasion of the ink of the printedtint area 120. - In the embodiment illustrated in
FIG. 1 , thedevice 100 comprises, in addition, a means for marking 145 asecond identification mark 146 on thedocument 100, in a position other than the position where the anti-copy mark andidentification mark 135 are located, for example on the reverse side of thedocument 100. For example, for this purpose one uses a low-power laser, with or without pre-printing a uniform area, or an ink that is invisible in the visible field and visible in the infrared field. Thesecond identification mark 146 is, potentially, identical to thefirst identification mark 135. - In the embodiment illustrated in
FIG. 1 , themeans 180 for reading theidentification mark 135, which comprises a camera and at least one light source (not shown), is associated to ameans 155 for verifying the quality of the identification mark read and a means (not shown) for withdrawing eachdocument 100 bearing a poorquality identification mark 135. In this way, the quality of each document is verified and all distributed documents benefit from the protection provided by utilizing this invention. The result of the verification carried out by the verification means 180 is transmitted, to be stored and used later, to a supervisor (not shown). - The means for withdrawing each
document 100 bearing a poorquality identification mark 135 is, for example, constituted of a “reject gate”, i.e. a shutter controlled so that, in one of its positions, the documents fall into a waste bin and, in another position, the documents are let through to thestacker 107. - The means 125 for reading the
anti-copy mark 115 formed on adocument 115 comprises a camera and at least one light source and is associated to a means for processing 178 the image captured by this camera, which determines characteristics of the image of theanti-copy mark 115, according to techniques known per se in the field of anti-copy markings. - The means 185 for determining whether the
anti-copy mark 115 and theidentification mark 135 present a pre-determined relationship carries out the verification of a document's validity: -
- from an image, it reads the identification mark “CV” corresponding to the
identification mark 135 “CV”, - with a “DEMOD” function, it processes “CV” to obtain a value “CENC′” corresponding to the value “CENC”,
- it carries out a decryption of “CENC′” with a “DECRYPT” function, inverse of the “ENCRYPT” function, and also a decryption key “KCV′”, to obtain the decrypted concatenation “C′”, corresponding to “C”. It is noted that, for symmetric encryption methods, “KCV′” is equal to “KCV”, but “KCV” and “KCV′” are different for asymmetric encryption methods.
- it deconcatenates the value “C′” with a “DECONC” function, inverse of the function “CONC”, to obtain values “VA′”, “ID′”, “T′” and “IDA′” corresponding to values “VA”, “ID”, “T” and “IDA” respectively,
- it reads the content of the
anti-copy mark 115 with a “READCNA” function and extracts the value “ICNA”, - it determines whether the anti-copy mark corresponds to an original or a copy, with an “AUTH” function and
- it calculates “VA″=F(ICNA)” or “VA″=F′(ICNA,K)”.
- from an image, it reads the identification mark “CV” corresponding to the
- There are therefore four case scenarios:
-
- either “VA″=VA′” and “AUTH(CNA)=ORIG”, in which case the document is validated,
- or “VA″=VA′” and “AUTH(CNA)=COPY”, in which case the document is a copy of a valid document,
- or “VA″≠VA′” and “AUTH(CNA)=ORIG”, in which case the document is a stolen original, on which a
non-compliant identification mark 135 “CV” has been affixed, - or “VA″≠VA′” and “AUTH(CNA)=COPY”, in which case the document is a reproduction.
-
FIG. 2 shows that the identification process for a document that is the subject of this invention comprises, firstly, astep 205 of marking the document with an anti-copy mark that is identical for a plurality of documents. - At the same time as the
step 205, during astep 210, a step of printing a uniform area is carried out. - Then, during a
step 215, the anti-copy mark is read. During this step the quality of the anti-copy mark is verified. - During a
step 220, an identification mark is generated that can vary from one document to another and according to the reading of the anti-copy mark. For example, a random or pseudo-random number is utilized during thestep 220 of generating the identification mark. - During a
step 225, the document is marked in order to form the identification mark on said document. Step 225 comprises: -
- a
step 230 of detecting the uniform area's arrival in front of said laser and - a
step 235 of emitting light with a laser in the uniform area.
- a
- During a
step 240, the identification mark is invisibly marked on the document. - During a
step 245, the identification mark is read and, during astep 250, the quality of the identification mark read is verified. - Depending on the result of the
step 250, during astep 255, the document is kept in the production flow or it is withdrawn from the production flow, so that all the identification marks of the documents remaining in the flow are of a sufficiently high quality. - As the content of each of the steps illustrated in
FIG. 2 is detailed with respect toFIG. 1 , it is not repeated here - Thanks to the utilization of the present invention, each document or product has an identification that can be read easily. In addition, the identification mark's line of dependence with the anti-copy mark can be verified. Conversely, any copy of this document is detectable in two ways: firstly, as a result of the anti-copy mark's deterioration and, secondly, as a result of the disappearance of the line of dependence between the anti-copy mark and the identification mark.
- In addition, the marking of the identification mark is rapid and precise, and does not require the use of a printer on the production line. It can be realized on a machine independent of the print chain with which the anti-copy mark and the uniform area are realized.
- The quality of each document is verified and all distributed documents benefit from the protection provided by utilizing this invention.
-
FIG. 3 shows that the process verifying a document's identification comprises: -
- a
step 305 of reading an anti-copy mark formed on a document, - a
step 310 of reading a document's identification mark that can vary from one document to another, - a
step 315 of determining whether the anti-copy mark and the identification mark present a pre-determined relationship and - a
step 320 of determining the validity of the anti-copy mark and the identification mark.
- a
- As each of the steps illustrated in
FIG. 3 is detailed with respect toFIG. 1 , their description is not repeated here.
Claims (19)
1-11. (canceled)
12. A document identification method, that comprises:
a step of marking the document with an anti-copy mark that is identical for a plurality of documents,
a step of reading an anti-copy mark,
a step of generating an identification mark that can vary from one document to another and according to the reading of the anti-copy mark and
a step of marking said document to form said identification mark on said document.
13. A method according to claim 12 , that comprises a step of printing a uniform area, wherein the step of marking the document to form the identification mark comprises a step of emitting light with a laser in the uniform area.
14. A method according to claim 13 , wherein the step of marking the document comprises a step of detecting the uniform area's arrival in front of said laser.
15. A method according to claim 12 , wherein a random or pseudo-random number is utilized during the step of generating the identification mark.
16. A method according to claim 12 , that comprises, in addition, a step of invisibly marking the identification mark on said document.
17. A method according to claim 12 , that comprises, in addition, a step of reading the identification mark and a step of verifying the quality of the identification mark read.
18. A method according to claim 12 , wherein the identification mark is of a textual type, i.e. readable by human beings.
19. A method according to claim 12 , wherein the identification mark also has an anti-copy property.
20. A document identification device that comprises:
a means for reading an anti-copy mark formed on a document,
a means for generating an identification mark that can vary from one document to another and according to the reading of the anti-copy mark and
a means for marking said document to form said identification mark on said document.
21. A device according to claim 20 , that comprises a means for printing a uniform area, wherein the means for marking the document to form the identification mark comprises a means for emitting light with a laser in the uniform area.
22. A device according to claim 21 , wherein the means for marking the document comprises a means for detecting the uniform area's arrival in front of said laser.
23. A device according to claim 20 , wherein a random or pseudo-random number is utilized by the means for generating the identification mark.
24. A device according to claim 20 , that comprises, in addition, a means for invisibly marking the identification mark on said document.
25. A device according to claim 20 , that comprises, in addition, a means for reading the identification mark and a means for verifying the quality of the identification mark read.
26. A device according to claim 20 , wherein the identification mark is of a textual type, i.e. readable by human beings.
27. A device according to claim 20 , wherein the identification mark also has an anti-copy property.
28. A method for verifying the identification of documents, that comprises:
a step of reading an anti-copy mark formed on a document,
a step of reading, on said document, an
identification mark that can vary from one document to another and
a step of determining whether the anti-copy mark and the identification mark present a pre-determined relationship.
29. A device for verifying the identification of documents, that comprises:
a means for reading an anti-copy mark formed on a document,
a means for reading, on said document, an identification mark that can vary from one document to another and
a means for determining whether the anti-copy mark and the identification mark present a pre-determined relationship.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0703146A FR2915600B1 (en) | 2007-04-27 | 2007-04-27 | METHOD AND DEVICE FOR IDENTIFYING OBJECTS OR DOCUMENTS |
FR0703146 | 2007-04-27 | ||
PCT/FR2008/000563 WO2008142307A2 (en) | 2007-04-27 | 2008-04-22 | Method and device for identifying objects or documents |
Publications (2)
Publication Number | Publication Date |
---|---|
US20120144503A1 true US20120144503A1 (en) | 2012-06-07 |
US8392715B2 US8392715B2 (en) | 2013-03-05 |
Family
ID=38792243
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/598,077 Active 2029-08-10 US8392715B2 (en) | 2007-04-27 | 2008-04-22 | Method and device for identifying objects or documents |
Country Status (4)
Country | Link |
---|---|
US (1) | US8392715B2 (en) |
EP (1) | EP2143082B1 (en) |
FR (1) | FR2915600B1 (en) |
WO (1) | WO2008142307A2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9811671B1 (en) | 2000-05-24 | 2017-11-07 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US9818249B1 (en) | 2002-09-04 | 2017-11-14 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US9846814B1 (en) | 2008-04-23 | 2017-12-19 | Copilot Ventures Fund Iii Llc | Authentication method and system |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8345315B2 (en) * | 2006-06-01 | 2013-01-01 | Advanced Track And Trace | Method and device for making documents secure using unique imprint derived from unique marking variations |
FR3017333B1 (en) | 2014-02-07 | 2019-06-21 | Advanced Track & Trace | METHOD AND DEVICE FOR SECURING AN OBJECT, METHOD AND DEVICE FOR CONTROLLING THEIR CORRESPONDENT AND SECURE OBJECT |
FR3018130B1 (en) * | 2014-03-03 | 2016-03-25 | Advanced Track & Trace | METHOD OF MARKING A HOLOGRAPHIC MATRIX AND HOLOGRAPHIC MATRIX THUS OBTAINED |
US9871660B2 (en) | 2014-12-23 | 2018-01-16 | Banco De Mexico | Method for certifying and authentifying security documents based on a measure of the relative variations of the different processes involved in its manufacture |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5790703A (en) * | 1997-01-21 | 1998-08-04 | Xerox Corporation | Digital watermarking using conjugate halftone screens |
US20020080995A1 (en) * | 1994-03-17 | 2002-06-27 | Rhoads Geoffrey B. | Digital watermarks and methods for security documents |
US20020168085A1 (en) * | 2000-04-19 | 2002-11-14 | Reed Alastair M. | Hiding information out-of-phase in color channels |
US6505179B1 (en) * | 1999-06-02 | 2003-01-07 | Kara Technology Incorporated | Verifying the authenticity of printed documents on universally available paper stock |
US6721440B2 (en) * | 1995-05-08 | 2004-04-13 | Digimarc Corporation | Low visibility watermarks using an out-of-phase color |
US20040079800A1 (en) * | 2002-10-29 | 2004-04-29 | Fuji Xerox Co., Ltd. | Document verification system |
US20040158724A1 (en) * | 2001-04-30 | 2004-08-12 | Carr J. Scott | Digital watermarking for identification documents |
US20050010776A1 (en) * | 2003-03-31 | 2005-01-13 | Kenen Leo M. | Optically variable devices with encrypted embedded data for authentication of identification documents |
US20050021474A1 (en) * | 2003-07-24 | 2005-01-27 | Geist Bruce K. | System for authenticating self-authenticating documents |
US20070016790A1 (en) * | 1998-11-19 | 2007-01-18 | Brundage Trent J | Identification document and related methods |
US7184569B2 (en) * | 2001-06-06 | 2007-02-27 | Spectra Systems Corporation | Marking articles using a covert digitally watermarked image |
US20070091377A1 (en) * | 2005-05-18 | 2007-04-26 | Patrick Smith | Real-time auditing of covert data marks |
US20090261158A1 (en) * | 2006-02-06 | 2009-10-22 | Marcus Maxwell Lawson | Authentication of cheques and the like |
US8055910B2 (en) * | 2003-07-07 | 2011-11-08 | Rovi Solutions Corporation | Reprogrammable security for controlling piracy and enabling interactive content |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6904525B1 (en) * | 1997-07-01 | 2005-06-07 | Pitney Bowes Inc. | Method for preventing counterfeiting of articles of manufacture |
EA003919B1 (en) * | 1999-12-08 | 2003-10-30 | Валентин Александрович Мищенко | Method and system for authentication of articles |
WO2006053685A2 (en) * | 2004-11-18 | 2006-05-26 | Giesecke & Devrient Gmbh | Value documents production and checking of value documents |
-
2007
- 2007-04-27 FR FR0703146A patent/FR2915600B1/en not_active Expired - Fee Related
-
2008
- 2008-04-22 US US12/598,077 patent/US8392715B2/en active Active
- 2008-04-22 EP EP08787981.3A patent/EP2143082B1/en active Active
- 2008-04-22 WO PCT/FR2008/000563 patent/WO2008142307A2/en active Application Filing
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020080995A1 (en) * | 1994-03-17 | 2002-06-27 | Rhoads Geoffrey B. | Digital watermarks and methods for security documents |
US6721440B2 (en) * | 1995-05-08 | 2004-04-13 | Digimarc Corporation | Low visibility watermarks using an out-of-phase color |
US5790703A (en) * | 1997-01-21 | 1998-08-04 | Xerox Corporation | Digital watermarking using conjugate halftone screens |
US20070016790A1 (en) * | 1998-11-19 | 2007-01-18 | Brundage Trent J | Identification document and related methods |
US8059858B2 (en) * | 1998-11-19 | 2011-11-15 | Digimarc Corporation | Identification document and related methods |
US6505179B1 (en) * | 1999-06-02 | 2003-01-07 | Kara Technology Incorporated | Verifying the authenticity of printed documents on universally available paper stock |
US20020168085A1 (en) * | 2000-04-19 | 2002-11-14 | Reed Alastair M. | Hiding information out-of-phase in color channels |
US20040158724A1 (en) * | 2001-04-30 | 2004-08-12 | Carr J. Scott | Digital watermarking for identification documents |
US7184569B2 (en) * | 2001-06-06 | 2007-02-27 | Spectra Systems Corporation | Marking articles using a covert digitally watermarked image |
US20040079800A1 (en) * | 2002-10-29 | 2004-04-29 | Fuji Xerox Co., Ltd. | Document verification system |
US20050010776A1 (en) * | 2003-03-31 | 2005-01-13 | Kenen Leo M. | Optically variable devices with encrypted embedded data for authentication of identification documents |
US8055910B2 (en) * | 2003-07-07 | 2011-11-08 | Rovi Solutions Corporation | Reprogrammable security for controlling piracy and enabling interactive content |
US20050021474A1 (en) * | 2003-07-24 | 2005-01-27 | Geist Bruce K. | System for authenticating self-authenticating documents |
US20070091377A1 (en) * | 2005-05-18 | 2007-04-26 | Patrick Smith | Real-time auditing of covert data marks |
US20090261158A1 (en) * | 2006-02-06 | 2009-10-22 | Marcus Maxwell Lawson | Authentication of cheques and the like |
Non-Patent Citations (1)
Title |
---|
Zhao Ling, Morphology Screen Coding anti-counterfeiting method, 21 March 2008, SpringerLink, Vol 4, Pages 371 - 374. * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9811671B1 (en) | 2000-05-24 | 2017-11-07 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US9818249B1 (en) | 2002-09-04 | 2017-11-14 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US9846814B1 (en) | 2008-04-23 | 2017-12-19 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US10275675B1 (en) | 2008-04-23 | 2019-04-30 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US11200439B1 (en) | 2008-04-23 | 2021-12-14 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US11600056B2 (en) | 2008-04-23 | 2023-03-07 | CoPilot Ventures III LLC | Authentication method and system |
US11924356B2 (en) | 2008-04-23 | 2024-03-05 | Copilot Ventures Fund Iii Llc | Authentication method and system |
Also Published As
Publication number | Publication date |
---|---|
EP2143082A2 (en) | 2010-01-13 |
FR2915600B1 (en) | 2009-08-21 |
EP2143082B1 (en) | 2020-07-01 |
FR2915600A1 (en) | 2008-10-31 |
WO2008142307A3 (en) | 2009-02-19 |
US8392715B2 (en) | 2013-03-05 |
WO2008142307A2 (en) | 2008-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8392715B2 (en) | Method and device for identifying objects or documents | |
RU2606056C2 (en) | Documents protection and authentication method and device | |
US8943325B2 (en) | Use of a digital signature obtained from at least one structural characteristic of a material element to protect the direct reading of sensitive data and method for reading this protected data | |
JP5528457B2 (en) | Geometric code authentication method and apparatus | |
RU2458395C2 (en) | Methods and apparatus for ensuring integrity and authenticity of documents | |
EP2932494B1 (en) | Method and apparatus for marking manufactured items using physical characteristic | |
US6980654B2 (en) | System and method for authenticating an article | |
EP3050031B1 (en) | System and method for document and article authentication | |
US20110038012A1 (en) | Method and device against forgery | |
US20050132194A1 (en) | Protection of identification documents using open cryptography | |
US20100027851A1 (en) | Apparatus, method and process for the stochastic marking and tracking of printed products | |
WO1997024699A1 (en) | Authentication of articles | |
US20090308530A1 (en) | Procede et dispositif d'authentification | |
US20160182239A1 (en) | Method for certifying and authentifying security documents based on a measure of the relative variations of the different processes involved in its manufacture | |
EP1788516B1 (en) | Method and device for authentication and identification | |
US10112431B2 (en) | Methods, devices and identification document for a person or an animal | |
FR2904130A1 (en) | Document e.g. identification card, identifying method for microcomputer, involves marking documents to make image on each of documents with variations for each document, and characterizing variations for forming imprint for each document | |
US8453941B2 (en) | Security campaign and method of creating the same | |
WO2016197025A1 (en) | System and method for production and verification of counterfeit-protected banknotes | |
CN105488359A (en) | Printed file original protection and verification method and apparatus | |
JP2023177613A (en) | Security document and verification method of security document | |
RU2616448C1 (en) | Method for producing valuable document, valuabl document and method for determining its authenticity | |
WO2000041124A1 (en) | Invisible graphics context identifying system and fabrication method thereof | |
CN116151294A (en) | Invisible two-dimensional lattice code capable of being spliced, cut and fully laid for implantation | |
JP2020005087A (en) | Information processing system and printing medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ADVANCED TRACK AND TRACE, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MASSICOT, JEAN-PIERRE;FOUCOU, ALAIN;SAGAN, ZBIGNIEW;SIGNING DATES FROM 20091207 TO 20091211;REEL/FRAME:024150/0122 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 8 |